2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS) 2021
DOI: 10.1109/qrs54544.2021.00012
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Structural Security Posture to Evaluate System Design Decisions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…What remains to be seen is whether we can leverage similar graph-based approaches to help reduce the prevalence of implicit interactions in a system design, and whether we can approximate the results obtained from the formal C 2 KA specification of a system. Specifically, graph-based measures such as degree centrality used in [MAS + 20] and eigenvector centrality used in [SJY21a] may be also usable for locating areas of a design to modify to reduce the prevalence of implicit interactions, and measurements discussed in other works may relate to how the prevalence of implicit interactions changes from one system design to another. Showing such a relationship exists can help further solidify these as strong design-level measurements for less formal security analyses.…”
Section: Graph-based Methods In System Developmentmentioning
confidence: 99%
“…What remains to be seen is whether we can leverage similar graph-based approaches to help reduce the prevalence of implicit interactions in a system design, and whether we can approximate the results obtained from the formal C 2 KA specification of a system. Specifically, graph-based measures such as degree centrality used in [MAS + 20] and eigenvector centrality used in [SJY21a] may be also usable for locating areas of a design to modify to reduce the prevalence of implicit interactions, and measurements discussed in other works may relate to how the prevalence of implicit interactions changes from one system design to another. Showing such a relationship exists can help further solidify these as strong design-level measurements for less formal security analyses.…”
Section: Graph-based Methods In System Developmentmentioning
confidence: 99%